EDCC 2026
21st European Dependable Computing Conference
7-10 April 2026
Canterbury, UK
Banner photography ©
Mark Wheadon
Technical Programme
Programme at a glance
All times are in Greenwich Mean Time (GMT)
| Tuesday, 7th April 2026 - Workshops | |||||||||||||
| 8:30 - 9:00 | Registration | ||||||||||||
| 9:00 - 10:30 | |||||||||||||
| CARS 2026 - 10th International Workshop on Critical Automotive Applications: Robustness & Safety | U-SPACE 2026 - 2nd Workshop on Dependability, Security, and Resilience for Future Airspace Safety | AI-SS 2026 - 1st International Workshop on AI Safety and Security | |||||||||||
| 10:30 - 11:00 | Break | ||||||||||||
| 11:00 - 12:30 | |||||||||||||
| 12:30 - 14:00 | Lunch | ||||||||||||
| 14:00 - 15:30 | |||||||||||||
| 15:30 - 16:00 | Break | ||||||||||||
| 16:00 - 17:30 | |||||||||||||
| 18:00 - 19:00 | Reception | ||||||||||||
| Wednesday, 8th April 2026 | |||||||||||||
| 8:30 - 9:00 | Registration | ||||||||||||
| 9:00 - 9:30 | |||||||||||||
| Opening Session | |||||||||||||
| 9:30 - 10:30 | Keynote |
||||||||||||
| Sofia Guerra (Themistoclea) - Fission for Algorithms? AI, Nuclear Power, and the Politics of Acceleration | |||||||||||||
| 10:30 - 11:00 | Break | ||||||||||||
| 11:00 - 12:30 | Session 1 - Distinguished Papers | ||||||||||||
| Sina Borrami, Xavier Gallois, Cedric Bregardis, Martin Törngren, Christian Mangold, Jorge Sánchez De Nova. "Functional Safety Requirements and Challenges Towards Independence for System-on-chip, with Specific Application to Railway Signaling Systems" | |||||||||||||
| Eid Albedah, Ilir Gashi, Jacob M. Howe. "Longitudinal Vulnerability Lifecycle Analysis" | |||||||||||||
| Florian Butsch, Andreas Kreutz, Christian Drabek, Gereon Weiss. "Enhancing Reliability of LLM-Supported Hazard Identification" | |||||||||||||
| 12:30 - 14:00 | Lunch | ||||||||||||
| 14:00 - 15:30 | Session 2 - Machine Learning Dependability | ||||||||||||
| Juan Carlos Ruiz García, David de Andrés, Juan Carlos Baraza. "CNN Robustness through Quantisation in Edge Devices: An Incomplete Solution" | |||||||||||||
| João Pino, João Campos, José D'Abruzzo Pereira. "Assessing the Impact of Historical Data on Machine Learning Vulnerability Detection Models" | |||||||||||||
| Georg Macher, Benedikt Murer, Alexander Sifkovits, Christoph Kreuzberger, Omar Veledar. "Validating the Assistant: A Structured Approach for Safe and Usable AI Copilots in Dependable Systems Engineering" | |||||||||||||
| 15:30 -16:00 | Break | ||||||||||||
| 16:00 - 17:00 | Fast Abstracts | ||||||||||||
| Thursday, 9th April 2026 | |||||||||||||
| 8:30 - 9:30 | Registration | ||||||||||||
| 9:30 - 10:30 | |||||||||||||
| Keynote |
|||||||||||||
| John A McDermid (University of York) - Safety of Autonomy: A Proportionate Approach? | |||||||||||||
| 10:30 - 11:00 | Break | ||||||||||||
| 11:00 - 12:30 | Session 3 - Intrusion Detection |
||||||||||||
| Elisa Chiapponi, Claudio Costanza, Vincent Rigal, Olivier Thonnard, Martynas Buozis, Philippe Gentric. "Scaling the Bait: Discussing the Feasibility of Pure Honeypots in Large-Scale Production Environments" | |||||||||||||
| Tommaso Puccetti, Andrea Ceccarelli. "HOWLATE: Attack Latency Measurements for the Evaluation of Intrusion Detectors" | |||||||||||||
| Louis Lolive, Guillaume Auriol, Vincent Nicomette, Florent Galtier, Simone Urbano, Jacques Girard. "Attack Scenarios and Embedded Intrusion Detection for Space Systems" | |||||||||||||
| 12:30 - 14:00 | Lunch | ||||||||||||
| 14:00 - 15:30 | Session 3 - Vulnerability Assesment | ||||||||||||
| Mateen Malik, Peter Folkesson, Behrooz Sangchoolie, Md Masoom Rabbani. "Evaluating the Impact of Barrage Jamming on the Image Quality of Live Video Streaming" | |||||||||||||
| Haseeb Chaudhary, Francois-Xavier Cadinouche, Elisa Chiapponi, Michel Demazeau. "From Foothold to Callback: Memory-Resident Payloads and Architectural Weaknesses in a Legacy Java Platform" | |||||||||||||
| Andrea Ciavotta, Alessandro Palma, Simone Lenti, Silvia Bonomi. "ThreatLinker: An NLP-based Methodology to Automatically Estimate CVE Relevance for CAPEC Attack Patterns" | |||||||||||||
| 15:30 -16:00 | Break | ||||||||||||
| 16:00 - 17:00 | |||||||||||||
| 17:00 -18:00 | Canterbury Walking Tour | ||||||||||||
| 19:00-21:00 | Banquet Canterbury Cathedral Lodge | ||||||||||||
| Friday, 10th April 2026 | |||||||||||||
| 8:30 - 9:30 | Registration | ||||||||||||
| 9:30 - 10:30 | |||||||||||||
| Keynote |
|||||||||||||
| Sara Tucci-Piergiovanni (Université Paris-Saclay) - Which Network Assumptions Make Blockchain Consensus Work? | |||||||||||||
| 10:30 - 11:00 | Break | ||||||||||||
| 11:00 - 13:00 | Session 5 - Safety and Fault Tolerance |
||||||||||||
| Fynn Luca Maass, Romana Blazevic, Georg Macher, Omar Veledar. "Shared Autonomy Under Human Error: Designing Robust Command Interfaces for End-to-End Driving" | |||||||||||||
| Benjamin Herd, Jessica Kelly, Jan Sabsch, Lydia Gauerhof. "Towards a compositional semantics for quantitative confidence assessment in assurance arguments" | |||||||||||||
| Alexander Heß, Franz J. Hauck. "Leveraging Speculative Ordering for Fast and Resillient Reads in BFT SMR Systems" | |||||||||||||
| Giannis Tzouros, Vana Kalogeraki. "Fault Tolerance Enhancements for Redundancy Conversion with Diagonally Interleaved Coding" | |||||||||||||
| 13:00 - 13:30 | Closing Session | ||||||||||||
| 13:30 - 14:30 | Lunch | ||||||||||||